会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Encapsulation and decapsulation for data disintegration
    • 数据分解的封装和解封装
    • US08520855B1
    • 2013-08-27
    • US12718885
    • 2010-03-05
    • Tadayoshi KohnoRoxana GeambasuHenry M. Levy
    • Tadayoshi KohnoRoxana GeambasuHenry M. Levy
    • G06F21/00
    • G06F21/602G06F2221/2143
    • A configuration for encapsulating data that is unreadable after a predetermined timeout. To encapsulate data a random data key is generated and split into shares. A threshold number of shares are needed to reconstruct the key. The shares are stored at random locations within one or more networks. Each location is configured to delete the stored data after a predetermined time period. Encapsulated data is created by creating a vanishing data object (VDO) comprising the encrypted data, and data sufficient to locate at least a threshold number of key shares from their stored locations. The VDO becomes inaccessible after enough shares of the data are deleted such that the data key cannot be restored. However, if prior to timeout a sufficient number of data key shares are located and retrieved the data key can be reconstructed. The reconstructed data key is then used to decrypt the original data.
    • 用于封装在预定超时后不可读的数据的配置。 为了封装数据,生成随机数据密钥并将其分割为共享。 需要临时数量的股份来重建密钥。 共享存储在一个或多个网络内的随机位置。 每个位置被配置为在预定时间段之后删除所存储的数据。 通过创建包含加密数据的消失数据对象(VDO)以及足以从其存储的位置定位至少一个阈值数量的密钥份额的数据来创建封装数据。 在删除了足够的数据份额后,VDO就无法访问,从而数据密钥无法恢复。 然而,如果在超时之前,定位和检索足够数量的数据密钥共享,则可以重建数据密钥。 然后,重建的数据密钥用于解密原始数据。
    • 5. 发明授权
    • Access control by testing for shared knowledge
    • 通过测试获取共享知识的访问控制
    • US08387122B2
    • 2013-02-26
    • US12466242
    • 2009-05-14
    • Michael ToomimJames FogartyJames LandayNathan MorrisXianhang ZhangTadayoshi Kohno
    • Michael ToomimJames FogartyJames LandayNathan MorrisXianhang ZhangTadayoshi Kohno
    • H04L9/00G06F21/00
    • G06F21/6218G06F2221/2131
    • Access to resource(s) intended to be shared with specific groups of individuals is controlled using concise tests of shared knowledge instead of (or in addition) to accounts and access control lists. Users can readily learn the concept and choose questions that will control the access by the desired group with little effort. Such questions can be relatively secure to guesses by those not intended to have access, particularly if the number of allowed guesses is relatively limited. Users can generally predict the security of their questions, but sometimes underestimate the ability of attackers to use Web searching or enumeration to discover answers. In such cases, the system can automatically discover weak questions and then suggest alternatives. By lowering the threshold to access control, shared knowledge tests can enable more types of information to acquire collaborative value on the Internet and on other types of networks.
    • 访问旨在与特定个人群体共享的资源使用共享知识的简洁测试而不是(或另外)对帐户和访问控制列表进行控制。 用户可以轻松学习概念,并选择可以很少的努力来控制所需组的访问的问题。 这些问题可能相对安全,以致不能访问的人的猜测,特别是如果允许的猜测的数量相对有限。 用户通常可以预测他们的问题的安全性,但有时会低估攻击者使用网络搜索或枚举来发现答案的能力。 在这种情况下,系统可以自动发现弱问题,然后提出替代方案。 通过降低访问控制的门槛,共享知识测试可以使更多类型的信息在互联网和其他类型的网络上获得协作价值。
    • 6. 发明授权
    • Radio frequency identification secret handshakes
    • 射频识别秘密握手
    • US08643475B1
    • 2014-02-04
    • US12759133
    • 2010-04-13
    • Tadayoshi KohnoAlexei CzeskisKarl KoscherJoshua R Smith
    • Tadayoshi KohnoAlexei CzeskisKarl KoscherJoshua R Smith
    • H04Q5/22
    • G06K19/07345H04Q2213/13095
    • An approach for defending radio frequency identification (RFID) tags and other contactless cards against ghost-and-leech (a.k.a. proxying, relay, or man-in-the-middle) attacks incorporates gesture recognition techniques directly implemented with the RFID tags or contactless cards. These tags or cards will only engage in wireless communications when they internally detect “secret handshakes.” A secret handshake recognition system is implemented on a passive WISP RFID tag having a built-in accelerometer. This approach is backward compatible with existing deployments of RFID tag and contactless card readers and is also designed to minimize the changes to the existing usage model of certain classes of RFID and contactless cards, such as access cards that are kept in a wallet or purse, by enabling execution of secret handshakes without removing the card. This novel approach can also improve the security and privacy properties in other uses of RFID tags, e.g., contactless payment cards.
    • 用于防御无线电频率识别(RFID)标签和其他非接触式卡对抗幽灵和水蛭(也称代理,中继或中间人)攻击的方法包括使用RFID标签或非接触式卡直接实现的手势识别技术 。 这些标签或卡只有在内部侦测到“秘密握手”时才会进行无线通信。 在具有内置加速度计的被动WISP RFID标签上实施秘密握手识别系统。 这种方法向后兼容RFID标签和非接触式读卡器的现有部署,并且还被设计为最小化对某些类别的RFID和非接触式卡(例如保存在钱包或钱包中的接入卡)的现有使用模型的变化, 通过执行秘密握手而不移除卡。 这种新颖的方法还可以改善RFID标签(例如非接触式支付卡)的其他用途中的安全性和隐私性。
    • 9. 发明申请
    • ACCESS CONTROL BY TESTING FOR SHARED KNOWLEDGE
    • 通过共享知识测试访问控制
    • US20090288150A1
    • 2009-11-19
    • US12466242
    • 2009-05-14
    • Michael ToomimJames FogartyJames LandayNathan MorrisXianhang ZhangTadayoshi Kohno
    • Michael ToomimJames FogartyJames LandayNathan MorrisXianhang ZhangTadayoshi Kohno
    • G06F7/04
    • G06F21/6218G06F2221/2131
    • Access to resource(s) intended to be shared with specific groups of individuals is controlled using concise tests of shared knowledge instead of (or in addition) to accounts and access control lists. Users can readily learn the concept and choose questions that will control the access by the desired group with little effort. Such questions can be relatively secure to guesses by those not intended to have access, particularly if the number of allowed guesses is relatively limited. Users can generally predict the security of their questions, but sometimes underestimate the ability of attackers to use Web searching or enumeration to discover answers. In such cases, the system can automatically discover weak questions and then suggest alternatives. By lowering the threshold to access control, shared knowledge tests can enable more types of information to acquire collaborative value on the Internet and on other types of networks.
    • 访问旨在与特定个人群体共享的资源使用共享知识的简洁测试而不是(或另外)对帐户和访问控制列表进行控制。 用户可以轻松学习概念,并选择可以很少的努力来控制所需组的访问的问题。 这些问题可能相对安全,以致不能访问的人的猜测,特别是如果允许的猜测的数量相对有限。 用户通常可以预测他们的问题的安全性,但有时会低估攻击者使用网络搜索或枚举来发现答案的能力。 在这种情况下,系统可以自动发现弱问题,然后提出替代方案。 通过降低访问控制的门槛,共享知识测试可以使更多类型的信息在互联网和其他类型的网络上获得协作价值。